Re: [iwar] some thoughts on (cyber)- terrorism


From: Fred Cohen
From: fc@all.net
To: iwar@egroups.com

Thu, 28 Dec 2000 17:22:15 -0800 (PST)


fc  Thu Dec 28 17:24:07 2000
Received: from 207.222.214.225
	by localhost with POP3 (fetchmail-5.1.0)
	for fc@localhost (single-drop); Thu, 28 Dec 2000 17:24:07 -0800 (PST)
Received: by multi33.netcomi.com for fc
 (with Netcom Interactive pop3d (v1.21.1 1998/05/07) Fri Dec 29 01:19:55 2000)
X-From_: fc@all.net  Thu Dec 28 19:19:28 2000
Received: from mu.egroups.com ([64.211.240.238]) by multi33.netcomi.com (8.8.5/8.7.4) with SMTP id TAA09121 for ; Thu, 28 Dec 2000 19:19:27 -0600
X-eGroups-Return: sentto-279987-853-978052937-fc=all.net@returns.onelist.com
Received: from [10.1.4.52] by mu.egroups.com with NNFMP; 29 Dec 2000 01:23:37 -0000
X-Sender: fc@all.net
X-Apparently-To: iwar@egroups.com
Received: (EGP: mail-6_3_1_3); 29 Dec 2000 01:22:16 -0000
Received: (qmail 35720 invoked from network); 29 Dec 2000 01:22:16 -0000
Received: from unknown (10.1.10.26) by m8.onelist.org with QMQP; 29 Dec 2000 01:22:16 -0000
Received: from unknown (HELO all.net) (65.0.156.78) by mta1 with SMTP; 29 Dec 2000 01:22:15 -0000
Received: (from fc@localhost) by all.net (8.9.3/8.7.3) id RAA25468 for iwar@egroups.com; Thu, 28 Dec 2000 17:22:15 -0800
Message-Id: <200012290122.RAA25468@all.net>
To: iwar@egroups.com
In-Reply-To:  from "Wanja Eric Naef \(IWS\)" at Dec 28, 2000 10:12:16 PM
Organization: I'm not allowed to say
X-Mailer: don't even ask
X-Mailer: ELM [version 2.5 PL1]
From: Fred Cohen 
MIME-Version: 1.0
Mailing-List: list iwar@egroups.com; contact iwar-owner@egroups.com
Delivered-To: mailing list iwar@egroups.com
Precedence: bulk
List-Unsubscribe: 
Date: Thu, 28 Dec 2000 17:22:15 -0800 (PST)
Reply-To: iwar@egroups.com
Subject: Re: [iwar] some thoughts on (cyber)- terrorism
Content-Type: text/plain; charset=US-ASCII
Content-Transfer-Encoding: 7bit

Per the message sent by "Wanja Eric Naef \(IWS\)":

...
> As mentioned before I mentioned that I do not like the term cyberterrorism
> (even though it is used
> on IWS) as it lacks precision. I rather talk of digital terrorism where one
> can distinguish between:

> digital-to-digital attacks (e.g. cyber attacks, DDoS, defacements, ...)

> physical to digital attacks (e.g. bomb attacks on a bank if they were aimed
> at disrupting information infrastructure)

> digital-to-physical (can someone come up with a good example? electronic
> attacks on safety critical systems, which then
> create human and physical casualties)

> Contrary to conventional terrorism:

> physical-to-physical attacks

> Any thought on this?

The thing I use to defin 'terrirists' the US State Department list of
'terrorist groups' and 'terrorist incidents'.  It is a way to get out of
the definitional issue and into the details.

Cyber terrorism - in my usage - is the use of cybernetic systems (i.e.,
comes from systems of feedback) by terrorists.  Again a real punt on the
issues, but it make it easier to do the work.

I don't really advocate these positions, but I do take them out of
pragmatism. 

FC
--
Fred Cohen at Sandia National Laboratories at tel:925-294-2087 fax:925-294-1225
  Fred Cohen & Associates: http://all.net - fc@all.net - tel/fax:925-454-0171
      Fred Cohen - Practitioner in Residence - The University of New Haven
   This communication is confidential to the parties it is intended to serve.
	PGP keys: https://all.net/pgpkeys.html - Have a great day!!!

-------------------------- eGroups Sponsor -------------------------~-~>
With US & International rates as low as 3.9c a minute from Net2Phone 
Direct Plus Up to 1500 FREE minutes; you can call everyone on your list!
http://click.egroups.com/1/10924/1/_/595019/_/978052937/
---------------------------------------------------------------------_->

------------------
http://all.net/